WIRELESS ACCESS CONTROL SYSTEM AND RELATED METHODS
A wireless access control system includes a remote access device and an electronic lock. The electronic lock communicates with the remote access device. The electronic lock controls the ability to lock and unlock a door in which the electronic lock is disposed. The electronic lock determines when the remote access device is at a distance less than or equal to a predetermined distance from the lock to enable the lock to be unlocked.
Latest Unikey Technologies, Inc. Patents:
- System and method for keyless access control system
- Wireless access control system including remote access wireless device generated magnetic field based unlocking and related methods
- Wireless access control system including lock assembly generated magnetic field based unlocking and related methods
- Wireless access control system for a door including proximity based lock disabling and related methods
- Wireless access control system operating in automatic calibration mode and including door position based lock switching and related methods
This application is a continuation-in-part of copending U.S. application Ser. No. 13/734,671, filed Jan. 4, 2013, which is a continuation-in-part of copending U.S. application Ser. No. 13/415,365, filed Mar. 8, 2012, which claims the benefit of Provisional Patent Application No. 61/453,737, filed Mar. 17, 2011, in its entirety and is hereby incorporated by reference.
FIELD OF THE INVENTIONThe present invention generally relates to access control systems, and more particularly, to wireless access control systems for door locks.
BACKGROUNDA passive keyless entry (PKE) system offers an increased level of convenience over a standard lock and key, for example, by providing the ability to access a secure building or device without having to find, insert, and turn a traditional key. A user may simply approach and touch a locked PKE lock and with little if any pause, the lock grants this user access if they are carrying an authorized token.
A PKE system is currently used in an automotive application and may offer increased convenience by identifying drivers and unlocking the car as they approach and grab the handle. Automotive access is traditionally given by inserting a key into the lock or by pushing buttons on a traditional remote keyless entry (RKE) system. In contrast, a PKE system grants access with reduced user interaction through the use of a hands free token carried by the driver.
Several technical challenges have been encountered during the engineering of a radio frequency (RF) PKE system, for example, for use in a residential lock. The desired basic perceived behavior of the PKE system in a residential application may be as follows: 1) the user approaches and touches the lock; 2) the lock authenticates the user with a minimally perceived delay; 3) the lock unlocks; 4) the lock may not operate if the authorized user is outside a desired range and the lock is touched by another, unauthorized, user; 5) the lock may not operate if the authorized user is on the inside of the house, and the lock is touched on the outside by an unauthorized user; and 6) the battery powered lock needs several months or more worth of battery life to prevent inconvenient and costly battery changes. 7) if a PKE fob is used, battery power needs to be over a year. 8) the lock can provide anytime, or configurable limited time, access control. 9) the lock has the ability to be locked without a remote access device
Indeed, as will be appreciated by those skilled in the art, with respect to the above desired basic perceived behavior of the PKE system in a residential application, primary challenges to be addressed include items 1 (Simplicity), 2 (speed), 4 (distance), 5 (location), 6-7 (battery life), and 8-9 (convenience). Accordingly, it may be desirable to improve authentication speed, proximity measurement, location determination, decrease power consumption, and increase convenience for example.
SUMMARY OF THE INVENTIONA wireless access control system includes a remote access device for authorizing access control to a lock when present on a user who touches, or triggers a proximity detector, of the lock.
A wireless access control system includes a remote access device for authorizing access control to a lock when the user possessing the authorized remote access device is within an activation range of the lock and door. If the authorized user is outside of activation range, signal range, or inside the lock and door, the remote access device will not be enabled to lock or unlock the door.
To calibrate the wireless access control system, the remote access device captures and stores radio frequency signal strength of each false reject event, i.e. access is denied where the criteria indicates that it should be granted. The system utilizes a learning algorithm criteria to determine whether the system should be calibrated to more readily accept these false reject situations.
In one embodiment, if a small number of false reject events precede a successful event within a small time period, then the wireless access system auto calibrates itself based on these values. In another embodiment, if a lower large number of false reject events are within ten percent of the current calibration value, the system would be calibrated to accept these events.
In another embodiment, in order to prevent imposters from spoofing the radio frequency access control system, the remote access device outputs an access request, the wireless access system sends challenged data to the access device determines the geolocation of the access device creates a response to the challenge data and encrypts the response with the geolocation data and transmits the encrypted response to the lock. The lock determines whether the location data encryption values correspond to an expected encryption corresponding to an expected position of the remote access device and authorizes access of a match is determined.
In another embodiment of the wireless access system, the wireless access system is provided with a first antenna and a second antenna, both located at the facility to which access is desired to be gained. The remote access device is placed a known distance from the first antenna. The communication is conducted between the remote access device and first antenna to determine a radio signal strength. The remote access device then communicates with the second antenna from the same known position or a different known position and the second radio signal strength is determined at the second antenna, the first remote signal strength is compared to the second remote signal strength to calibrate the first antenna and the second antenna.
In another embodiment, an accelerometer is disposed within a door within which the lock is also disposed. The accelerometer outputs a g-force signal as a function of movement of the door. A controller receives the g-force signal from the accelerometer, calculates a g-force plot as a function of force over time and determines whether the door is open or closed, as well as a position of the door. The controller outputs a signal to a user of the wireless access system if it is determined that the door is not fully closed, even if indicated to be locked.
In another embodiment of the invention, the access system queries the remote access device upon detection of a door closing event. The controller determines whether the radio signal strength is below a threshold value or is decaying at a predetermined rate. If the radio signal strength of the signal from the remote access device satisfies either of these conditions, the controller locks a lock disposed within the door.
In another embodiment of the invention, a touch sensor includes a capacitor if enough capacitance is added to the system, the touch sensor will determine that a touch event has occurred enabling control of the lock. If a controller determines that a predetermined number of touches has occurred within a predetermined time window, but the predetermined capacitance has not been reached, then a controller adjusts the capacitance threshold necessary to enable controlling of the lock.
In yet another embodiment, in order to determine that a remote access device is actually in position to access a lock, the access control system determines the radio signal strength of an access request from the remote access device. The controller at the remote access device determines whether the radio signal strength is greater than a predetermined value. If yes, then a signal is sent from wireless access system to the remote access device. The remote access device determines the radio signal strength of the signal from the wireless access system and permission to control the lock is only granted if the remote access device determines that the remote signal strength of the signal from the wireless access system is above a predetermined threshold.
In another embodiment, the wireless access system traces the whereabouts of a person within the facility locked by the lock of the wireless access system by determining that a user has gained access to the facility utilizing a remote access device. The access control system logs the time of access for the remote access device. The remote access system periodically pings the remote access device and determines whether the remote access device is within the facility or outside the facility for as long as the wireless access system determines that the user is within the facility.
In another embodiment, authorization credentials may be transferred or copied between a first remote access device and another by determining, utilizing a radio signal strength value, whether the authorized remote access device is within sufficient distance of the unauthorized device. Once it is determined that the devices are within sufficient distance from each other, authorization credentials may be transferred or copied to the unauthorized device.
In yet another embodiment, the mobile access device may be used to identify and pair two other devices in a preferred embodiment, the pairing is between an access point and the access control system. A user taps, brings the mobile device within a predetermined distance of the access point, and receives credential or identification information from the access point. The mobile device is then paired to the access control system and pairs the access control system with the information from the access point.
In yet another embodiment of the invention, a sensor is disposed within the cylinder of the door lock for detecting the insertion of a metal key to determine whether the lock has been locked or unlocked. If the sensor determines that a key has been inserted, an insertion signal is sent to a controller which disables other keyless methods for controlling the lock.
In still another embodiment of the invention, the remote access device provides security to the system by creating an updater command message which is broadcast the remote access device. If the remote access device receives the message, it determines whether the message is a control message and if so, the message is processed.
The present description is made with reference to the accompanying drawings, in which various embodiments are shown. However, many different embodiments may be used, and thus the description should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. Like numbers refer to like elements throughout, and prime notation is used to indicate similar elements or steps in alternative embodiments.
Referring to
Alternatively, in another embodiment, the lock 11′ may be motor powered (
Lock 11 includes a proximity detector 27 for detecting the presence of a user. Proximity detector 27 outputs a presence signal in response to detecting a user. As discussed below, proximity detector 27 may be a capacitance touch sensor, a button, a trip light circuit, a near field detector, a radio frequency signal strength detector, an audio switch (which actuates upon receipt of audio signals of a set frequency), or the like. Proximity detector 27 outputs the presence signal to controller 21.
In one non-limiting exemplary embodiment, lock 11 is in a hibernation or low power level state. Upon triggering a proximity detector 27 outputting the presence signal by a user's touch for example, controller 21 causes system 10 to wake up and start listening for remote access device's 15 advertisements. Upon finding a remote access device 15, the lock 11 communicates with (connects) to the remote access device 15, determines if the device 15 is an authorized user via a secure method such as an encrypted key exchange in one non-limiting embodiment. Lock 11 then determines if the remote access device 15 is in range to control the lock 11, and ultimately provides access to an authorized user; all within a short or small perceived delayed time (ten seconds or less) if all the criteria is met.
Additionally, the lock 11 may be advertising or listening (sending or sampling signals) at a low frequency rate in order to conserve battery power yet establish a communication link with the remote access device 15 in advance of or in lieu of a user's touch. In this way, increasing the speed of the authentication process to create little if any perceived delay for the user.
In another embodiment, once the lock 11 is touched by a user, the lock wireless communication circuitry 22 changes states and starts listening for a remote access device 15 advertisement. Once a connection is made authentication can be done upon connection, or upon lock or unlock request from remote access device 15. Once authenticated, the lock 11 tracks the Received Signal Strength Indicator (RSSI) of the remote access device until the algorithm determines it is within a defined accessible range from lock 11. The lock 11 gathers RSSI data and utilizes this data in an algorithm to determine the position of the remote access device 15. Once the remote access device 15 is within a pre-determined accessible distance (control range), the lock grants remote access device 15 access control to lock or unlock the lock 11. Additional antennas may be used in some embodiments for more accurate position determining, and to increase authorized user capacity and overall speed of the wireless access system 10,
Alternatively, in another embodiment, the lock may be a doorknob lock, handle lock, or other style lock for example.
Referring now additionally to
Alternatively, or additionally, the remote access device 15 may be a mobile wireless communications device, such as, for example, a Smartphone that may include the remote wireless access electronics described above cooperating with an application 17′ stored in memory 17 (
Referring now additionally to
The RPU 30 may link to an off-site web-based server 34 via a communications network such as the internet 28, for example. This advantageously enables RPU 30 to receive near real time updates for adding or removing users, one-time access, extended access or specific timed access, and other connectivity related updates and functions at lock 11, as will be appreciated by those skilled in the art. In addition, the RPU 30 can send lock 11 status and transaction updates via the Internet 28 to the server 34 which can be viewed on a remote access device 15 or personal computer 25, for example. Additional services may be selectively provided via the Internet using the connectivity of RPU 30 with server 34, for example. While the RPU 30 is described herein as a plugin device, it will be appreciated by those skilled in the art that the functionality of the RPU 30 may be embodied in any of a number of form factors, for example, such as a WIFI network or a mobile cellular based unit making use of cell network 35.
Referring now additionally to
Operation of the wireless access system 10 will now be described with reference additionally to the flowchart in
If lock 11 “sees” (receives) an advertisement from a fob 15 within a predetermined time period in a Step 104, and the fob 15 is authorized for access at that time as determined by lock 11 in a step 107, a connection is made between fob 15 and lock 11 in a step 110. It is then determined whether fob 15 is still connected by determining whether communication has occurred within a predetermined time period in a Step 112.
If the fob 15 has not timed out, then in a Step 114 a lock 11 performs a challenge response verification process to authenticate the remote access device 15. If fob 15 is verified by comparing an identification portion of the advertisement signal to information stored at system 10, lock 11 begins to gather and process location and positioning data of fob 15 in a step 117 utilizing Received Signal Strength Indication (RSSI) by way of non-limiting example. Utilizing the location and positioning algorithm in step 117, lock 11 can determine if the user is within activation range in step 118. If the user is in the activation range as determined in step 118, the control of lock 11 is given to fob 15 and the lock 11 will lock or unlock as needed in a step 119, then the lock 11 disconnects from fob 15 in a step 120 and returns to step 100 to its low power state 101.
If in Step 104 the advertisement from the fob 15 is not received within a predetermined time window or the fob is not authorized as determined in Steps 107 and a Step 109 in which the signal is ignored, or the fob connection times out in a Step 112, or the challenge response in Step 115 is not an appropriate one, then the process returns to Step 100 to be repeated.
In another embodiment, controller 21 can enable locking the door without the use of fob 15. If proximity detector 27, which may include a touch sensor, determines that lock 11 was touched at least a second time within a time window, preferably measured in seconds, in a Step 106, then controller 21 determines whether lock 11 is unlocked in a step 108. If it is determined that lock 11 is in fact unlocked in Step 108, then it is determined whether or not or not the lock 11 is touched a third time within a predetermined time window measured in seconds or less, and if in fact the lock 11 is touched three times within the time window, then controller 21 causes lock 11 to lock bolt 14 in a Step 113 and the process is returned to the beginning in Step 100 to monitor for another remote access device 15. If the deadbolt is not touched the prescribed number of times during the time window, in Steps 106 and 111, or is already in the locked state as determined in Step 108, then the process returns to Step 100 to await connection with another remote access device. In this way, a door can be locked merely by activating proximity detector 27, a predetermined number of times within a predetermined time period, or by continuously activating proximity detector 27 for a predetermined time period.
Reference is now made to
Specifically, in a step 2201 as shown in
If sensor 27 has not determined that a key has been inserted, then in a step 2205 it is determined whether an electronic locked or unlocked event described above has occurred. If it has, the process ends in the step 2206. If the electronic lock session unlock event has not occurred as determined step 2205 by the controller 21, then the lock is manually changed to a lock position from the interior of the door in a step 2207. The process ends in a step 2208.
In another embodiment, the system may work without the need to touch lock 11 in step 102. In this embodiment, lock 11 and remote access device 15 determine that they are within range of each other to begin processing without the need to initially touch lock 11. This allows for the control of lock 11 well ahead of being sufficient proximity of a door to touch lock 11.
In this preferred non-limiting embodiment, an in-range remote access device 15′, such as a Smartphone, responds in a Step 121 to a broadcast advertisement from the lock 11 in a Step 121 by controller 21. If the Smartphone 15′ is authorized for access at that time as determined by controller 21 in a Step 122, a connection is made in a Step 124 between a Smartphone 15′ and lock 11. If Smartphone 15′ is authenticated during a challenge response verification process in Step 125, lock 11 begins to gather and process location and positioning data in a Step 127, utilizing RSSI or a signal from Global Positioning System (GPS) enabled Smartphone 15, for example. The RSSI processing and authentication are preferably done in parallel so that the signal strength of authentication signals are used to determine the location of remote access device 15; speeding up the overall process. Utilizing the location and positioning algorithm in Step 127, the lock 11 can determine if the user is in activation range in a Step 129. In an optional Step 128, lock 11 may determine whether lock 11 has been touched prior to determining whether the user is in range in Step 129. If the user is in activation range, lock 11 will lock or unlock (reverse state) in a Step 130.
As with the touch process, in this proximity determination process at any time controller 21 or 32 determines that the response is inappropriate (Step 125), or remote access device 15 is not a one-time key (131) the process is returned to Step 100 to begin again. However, if the button has not been pressed in Step 128 then the process merely returns to redetermining the location of remote access device 15 in Step 127.
A hybrid approach is also possible. In a Step 105, once it is determined that the lock has been touched in Step 102 and lock 11 listens for a broadcast from fob 15 in Step 103, if a lock 11 determines in a step 105 that a Smartphone connectable advertisement response has been received within a predetermined time window; five seconds or less in a preferred embodiment, the process continues for Smartphone 15′ at Step 124 as described above. If the response is not appropriate, as determined Step 105, then the process returns to the beginning in Step 100.
In another preferred non-limiting embodiment, the location and positioning algorithm performed in a Step 127 can utilize RSSI in formation from the lock 11 to the remote access device 15′. This can be done by the remote access device 15′ receiving RSSI information from the lock 11 and transmitting this RSSI information back to the lock 11 to be processed by controller 21 for location and positioning purposes.
In another preferred non-limiting embodiment, any unauthorized user can lock the lock 11 by triggering the proximity detector three consecutive times within a predetermined time window such as discussed above in Step 106. In another possible embodiment, the lock 11 can be touched and held for greater than a predetermined time to lock the lock 11.
In another preferred non-limiting embodiment, only remote access devices 15 looking for a unique advertisement from the lock 11 will respond with a connectable advertisement. In this way, the system can provide access control to many possible authorized devices without adding additional delays per additional authorized devices.
Authentication lends itself to several issues. As is known in the art, imposters can trick a radio frequency access control system by remotely capturing the RF data packets from wireless access device 15, then transmitting those packets through another medium (i.e., internet or cellular) to another device, to act as the imposter to the wireless access system 10.
In one preferred embodiment, use is made of the GPS enabled features of the smart phone version of wireless access device 15 to further authenticate authorized users.
Reference is now made to
As seen in
In another embodiment of the invention, spoofing by imposters can be prevented by utilizing the RF signal strength as measured at both lock 11, or the overall wireless access control system 10, as well as at remote accessing device 15. Wireless access control system 10 can determine whether remote accessing device 15 is actually within an expected physical proximity to lock 11. In other words, a calculation of RSSI is performed at wireless remote access device 15 and remote access control system 10. As a result, this minimizes the replay attack by requiring any imposter to be in close proximity to the door.
Reference is now made to
In another methodology spoofing or hacking can be prevented by utilizing a unidirectional communication methodology to insure the access control system 10 cannot be controlled by an outside device not intended to operate the system, but allows for coexistence with other electronic equipment.
Reference is now made to
In a step 2301, a new update/command message is constructed. In a step 2302, a unidirectional message is broadcast from access control system 10 to remote access devices 15. In a step 2303, it is determined whether a message is received from remote access device 15. If no message is received, then in a step 2304 the process ends and access is denied.
If the message is received from device 15, then in a step 2305, it is determined whether or not the message is a control message. If not, then the message is disregarded and the process ends in a step 2307. If the message is a control message, then the message is processed in a step 2306 confirming that the device 15 is authorized.
In another embodiment, information about remote access device 15′ may be stored at any one of memory 55, and memory associated with personal computer 25 or server 34. Remote access device 15 may have limited access to lock 11. By way of example, access may only be during predetermined time periods of a day, or for a limited number of times; such as a one-time use key. If the remote access device 15′, represents a one-time key as determined in Step 131, this key will be deleted from the memory or stored in the memory of system 10 as an invalid key in Step 132 to prevent further access.
In another embodiment in which the remote access device 15′ is a Smartphone, tablet, or similar device, the lock 11 may also request the user to verify their access control request by requiring the transmittal of a PIN, Password or other authentication code. Lock 11 transmits a signal prompting the users, on their remote access device 15′, for example, via a display on their mobile wireless communications device to answer with a PIN. Controller 21 compares the received password to authentication code previously stored by user at system 10, prior to enabling control of lock 11. This can be done to add additional security or to assist with inconclusive positioning or location information.
Referring now additionally to
In one non-limiting embodiment, when the user 70 approaches, their position is determined by receiving signals from remote access device 15′ at an exterior facing antenna 52. Once user 10 is within activation range 91, and touches the lock 11, the lock 11 radio switches one or more times to an internal antenna 50 to verify the user 70 is on the outside. If the calibrated RSSI, as determined by controller 21, or some other element of system 10, from one or more readings from the internal antenna 50 is less than the external calibrated RSSI reading or readings, user 70 is determined by controller 21 to be on the outside and the lock 11 will lock or unlock. If the calibrated RSSI from the internal antenna 50 is greater than the RSSI reading or readings from external antenna 52, user 70 is determined to be on the inside, within inside range 92 by controller 21, and the lock 11 will not operate as to prevent unauthorized entry.
The wireless access system 10 may include a calibration feature. More particularly, a connection between the remote access device 15′ and the lock 11 may be used by the algorithm to calibrate the RSSI input to adjust for varying antenna characteristics of remote access devices 15′ or changes in user behavior or environmental conditions, for example. In one non limiting example, the lock 11 determines RSSI values for remote access devices 15′ unlocking and locking events over a number of distinct communications. It then determines a maximum average activation range 91 value to calibrate with.
In another non limiting embodiment, the lock 11 can request that the remote access device 15′ send its RSSI values as received from the lock 11 and utilize these to calibrate for remote access device 15′ antenna differences. Reference is now made to
If a user incorrectly calibrates the remote access device 15′ in a radio frequency (RF) electronic access control system, or if the RF properties of the control device change over time, an auto calibration system may be implemented in one non-limiting preferred embodiment to improve the efficiencies of the overall system and the appearance of instantaneous control to user. In another embodiment, the calibration is continuously self-adjusting per the last “n” number of access control events as to adjust for user behavioral changes or local condition changes over time.
Reference is now made to
As seen in
In a step 1202 it is determined whether the false reject event has the characteristics to be used for the calibration process. By way of non-limiting example, within ten percent of the calibrated accepted activation level. If not, the process ends in a step 1203 until another false reject event occurs and the process begins again in step 1201. If in step 1202 it is determined that the false reject event has the necessary characteristics, then in a step 1204 the system 10 receives the RSSI values for the false rejects and recalibrates itself to recognize the RF electronic access control signal as appropriate to prevent further false reject events. It does this by readjusting the reject criteria for the RF/RSSI for access control system 10 and storing the new threshold.
The wireless access system 10 may also include a computing device 25, for example, a personal computer at the user's residence for use in a revocation process by way of example. The computing device 25 may include circuitry for wirelessly communicating with the RPU 30, remote access device 15, and/or lock 11 for revoking a permission from remote access device 15. For example, the computing device 25 may include Bluetooth Low Energy communications circuitry, for example. Other devices and communications protocols may be used in the revocation process.
While the wireless access system 10 is described herein with respect to a door, the wireless access system may be used for access control or protection of, but not limited to, appliances, a safe, heavy machinery, factory equipment, power tools, pad locks, real estate lock-boxes, garage door openers, etc., for example. Alternative remote access device 15 embodiments may include a pen, watch, jewelry, headset, FDA, laptop, etc., for example. The wireless access system 10 may be used to protect other devices or areas where it may be desired to restrict access.
The present invention lends itself to a process for transferring one-time, limited time, or permanent use Passive Keyless Entry (PKE) token key codes to a cellular or other wireless mobile remote access device 15′ for use with PKE access control devices, such as lock 11 for example. Reference is now made to
The authorized user of lock 11, chooses to send an unauthorized user an authorized token for the lock 11 by way of a mobile application 17′ on authorized remote access device 15′ to unauthorized remote access device 15″. The authorized user can select the option within mobile application 17′ on authorized remote access device 15′ for a one-time, limited time, or permanent token to send to unauthorized remote access device 15″.
In one exemplary, but non limiting embodiment, the authorization credentials are transmitted from the authorized remote access device 15′ to the currently unauthorized remote access device 15″ via the cellular network 35. Now unauthorized remote access device 15″ stores and makes use of the authorization credentials and becomes an authorized user of the lock 11. Another embodiment can be that authorized remote access device 15′ sends a request for information to unauthorized remote access device 15″ which responds to authorized remote access device with useful information such as device 15″ Bluetooth address and authorization permissions and/or credentials. This information is then transmitted from authorized remote access device 15′ to the RPU 30 via the cellular network 35 to the internet, then from the internet to a home router 36 that is connected to the RPU 30. The RPU 30 then transfers identification information wirelessly to the lock 11, so that when the now authorized remote access device 15″ tries to access the lock 11, it is already a known remote access device, thus speeding up the initial access control process.
It should be noted that the use of the mobile phone cellular network was used by way of non-limiting example. The key code can be sent directly to another device via SMS text message, Email, or other data communication protocols. Additionally, the key codes can be sent to another device through server 34, or a server disposed in the communications network, which can also act as a master database. Additionally, the key code master database can allow a user to manage (send, receive, revoke) locks from a secured webpage. Additionally, the key code master database, permissions and/or credentials and identifications may be used to restore a device's key codes via a mobile application with verification upon a lost or damaged device.
Reference is now to
More specifically, as seen in
In a step 2003, the authorized remote access device 15′ determines whether the RSSI from the unauthorized device 15″ is sufficiently strong, i.e., above a predetermined threshold. If not, the process stops in a step 2004 to prevent inadvertent transfer. If the RSSI is sufficiently strong, then key transfer occurs in a step 2005 by transmitting the authorization information from authorized device 15′ to remote access device 15″.
If a stand-alone internet access point such as a lock 11, or even two stationary components such as lock 11 and RPU 30, is to be connected with access control system 10, a secure method is needed to pair the two using a third electronic device, taking advantage of radio frequency communication amongst the devices. The third electronic device is an authorized mobile device 15′ preferably having GUI. As seen in
This present invention also lends itself to revoking authorization. In a process to revoke a key where the key is a smart phone, tablet or the like, once a user decides to revoke a key code, the user may send a termination request directly to the remote access device key 15′ being revoked, via the cellular network 35 using computer 25 or another computing device. If there is no response, the request is broadcast to users, for example, all users, in the “approved” network (i.e. users enrolled in the same lock 11). The request is stored in the background memory on their respective keys. Then when any authorized user is in range of the lock 11, the claimant request is activated and the key code of the requested revoked user is revoked from the lock, denying access to the revoked user. In another embodiment, the revoked key information can be sent via the cellular network 35, or through the internet 28, to the RPU 30, then to the lock 11 to disable access.
With respect to power conservation and increased security methods for the lock 11, a remote access device 15 for example, may include the remote access application and a global positioning system (GPS) receiver 23. The GPS receiver may be used to track the location of remote access device 15 relative to the position of lock 11 and enable communication by the lock 11 only when the remote access device 15 is within range, by geo fencing for example. If the remote access device 15, i.e. mobile wireless communications device 15′ is outside the range, as determined by the GPS receiver 23, remote access 15 may tell the lock 11, via the cell network 35 and internet 28 through the RPU 30 to go into sleep mode or turn off. Additionally, or alternatively, the location of the mobile wireless communication device 15′ may be determined via triangulation with wireless service provider base stations or towers, for example.
Alternatively, or additionally, the remote access device 15 or mobile wireless communications device 15′ may wake up, determine a position, calculate a fastest time a user could be within range of the lock 11, then wake up again at that time and recalculate. When the user is within the range, it may enable the remote access application 17, and, thus communication for authentication or other purposes. Alternatively, or in addition to this method, lock 11 or the RPU may determine a distance between the remote access device 15 and lock 11 and change the length of the interval and/or frequency of occurrence of each communication as a function of the distance.
Another method in which to conserve power consumption within remote access device 15 is to provide a wake-up mechanism internal to remote access device 15. Reference is now made to
Remote access device 915 includes a radio signal generator 918 powered by a battery 900 to provide portability. Radio signal generator 918 generates a radio signal to be transmitted by an antenna 53 to be received at the lock 11 to gain access to the door in which a lock is provided as discussed above. A controller 16 controls operation of remote access device 15 and provides an input to radio signal generator 918. An authentication chip 24 provides an information input to the controller 16, such as security identification information, encryption information, permissions, authentications, and the like to be carried by the radio signal generated by radio 18 and recognized at the lock 11. In an alternative embodiment, the authentication process can be performed on the controller 16.
If radio 18 were to continuously output a radio signal even when the fob is not in use, it would exhaust battery 900 at a higher rate requiring frequent replacement, if replacement were even possible in some key fob constructions. A trigger mechanism is provided within key fob circuitry 915 to begin the creation of a radio signal by radio signal generator 918. In one preferred embodiment, an accelerometer 39 is provided within key fob circuitry 915 and outputs an acceleration signal to the controller 16 upon acceleration of the key fob 915. The acceleration signal is output to the controller 16 and the radio signal generator 918 is triggered to begin generating a radio signal. Radio signal generator 918 includes an onboard counter for measuring a predetermined time period during which transmission of the radio signal generator 918 occurs. The signal from the accelerometer 39 causes controller 16 to begin the transmission of the radio signal, and absent the acceleration signal, after the predetermined time period, the radio signal generator 918 does not operate. In this way, a radio signal is only produced when fob 15 is moving; such as when a person is in motion and approaches a lock carrying the fob for example, and not producing a radio signal when someone removes the key fob 15 from their pocket and sets it down on a table for example.
In one embodiment, light emitting diodes (LED) 901 are provided for providing a visual signal to a user of key fob circuitry 915. By way of example, LED 901 may be powered during transmission of the radio signal by radio signal generator 918, or may indicate a low battery condition.
By use of key fob circuitry 915, battery life is increased by limiting the transmission of the advertising radio signals to times when remote access device 15 is in motion. This also increases security if the user were to leave their keys near the lock 11, but just on the inside of the door. If the key were in a bowl or on a table near the door as often done, no motion would be sensed and the radio signal would not be triggered so there would be no false acceptance of an outside user resulting from the transmission of the radio signal while the key is on an interior side of the lock.
Reference is now made to
The Radio 1022 operates under the control of a controller 21, memory 55, accelerometer 26, authentication unit 54, real time clock 1002, and proximity detector 27. During operation, controller 21 is dormant, not actively controlling bolt 14 or electronic lock 1014, so it maintains its current condition until acted upon. Proximity detector 27 may be a capacitance detector as discussed above. Proximity detector 27 outputs a presence signal 10 when the proximity of a user is detected, to radio controller 21 to wake up radio 22 to begin authentication to ultimately perform the lock or unlock operation.
It should be noted, that proximity detector 27 takes the form of a capacitance detector. However, as seen in
Alternatively, the proximity detector 27 may also be a near field detector, a magnetic field detector, or even a radio signal detector for detecting the signal from a remote access device such as remote access device 15 as it is within close proximity of lock 11. In yet another embodiment, proximity detector 27 may take the form of a second lock, or handle, such as on a screen or storm door. Activation of the second lock is detected by proximity detector 27 which outputs a presence signal.
In the touch embodiment, proximity detector 27 measures capacitance and detects the discharge of a known capacitor value and controller 21 compares the calculated value with the known capacitor value after a touch event. If enough capacitance has been added to the system, proximity detector 27 will trigger a touch event; allowing the process to begin. However, during varying weather conditions, the sensitivity of a capacitance based proximity detector 27 may change. By utilizing a proximity detector 27 with actively adjusting sensitivity, i.e. utilizing a variable capacitor or other method, the sensitivity of the sensor may be adjusted to reduce false touch activations in such conditions.
Reference is now made to
Lock circuitry 1011 also includes a memory 55 for storing data such as recognition information for authorized users or even periods of operation corresponding to specific users. By way of example, staff at a facility may only be provided access during their shift occurring at a known predetermined time. Memory 55 may also store active time periods of the day such as morning, or afternoon, when lock 11 is most in use.
A real time clock 1002 provides a real time output to controller 21 which in conjunction with access times stored in memory 55 determines when to provide access for certain authenticated users, discussed in more detail below, or when to stay on such as during known busy time periods to eliminate any operating delays. For example, between the hours of 8:00 and 9:00 when people may be showing up for work, or in a residential setting, the hours of 2:00 to 4:00 when children are returning from school, one may want the radio 22 to be broadcasting or listening at a faster rate to eliminate any delay in the operation of locking or unlocking the door.
The Authentication chip 54 or authentication software running on system 10, creates public and private keys to be used by the controller 21 to authenticate and confirm the identity of the authorized remote access devices 15. The authentication unit 54 which includes encryption data for encrypting communications transmitted by radio 1022 or unencrypting messages received at either one of the antennas 50 or 52.
During operation, a user will approach or touch lock 11 to be detected by proximity detector 27 sending a user interaction signal to the controller 21. The radio 1022 will receive signals from a remote access device 15 at one or both of antennas 50 and 52. The received signals will be processed by the controller 21 to determine position and location as described above. Additionally, the controller verifies the remote access device 15 is authorized for access at that time as determined by utilizing the real time clock 1002 and data stored in memory 55. If access is permitted, or permitted as a function of time of day, then the actual signal received by the radio 1022 will be authenticated utilizing the authentication chip 54.
If the radio signal is recognized by the controller 21, the controller 21 will lock or unlock the electronic lock 14.
An accelerometer 26 may also provide an input to the radio 22 via the controller 21. An accelerometer 26 embedded in the door senses when the door is open or closed, or even experiences vibration such as a knock. In the absence of authorization as a function of memory unit 55 working with the real time clock 1002 and/or authentication processing utilizing authentication chip 54, the triggering of accelerometer 26 is an indication of an unwanted person at the door or even a break-in. In one embodiment, if a signal is received from accelerometer 26 in the absence of other authorizing indicia, then the controller 21 may send a signal via the radio 1022 along either one of internal antenna 50 or external antenna 52 to remote access device 15 or RPU 30 to cause an alert to be sent to a selected user.
Use of the accelerometer to detect door openings and closings as described above provides an advantage over prior art detection systems which utilize an interlock feature; a mechanical switch indicating the condition of the door (open or closed). By using the accelerometer at the lock, or embedded within the door, no additional wiring based on feedback from the accelerometer is required. The use of g-force plots output by the accelerometer can be used to determine door open and closed events knowing the door starting position as closed. Spike in acceleration can be used to determine if the door has been open or closed, or if the door is partially closed. Each door type will have unique traits which may be utilized as part of an algorithm to determine door position. This, coupled with a bolt position sensor insures that a door is fully or closed and secured/locked.
As seen in
Once the door is determined to be closed, as determined above, then the door may be locked. The door may be locked as a timed event, in other words, locked in predetermined time intervals, after the door is determined to be closed and no activity is sensed at the door by lock 1011. However, communication with wireless remote access device 15 may also be used to automatically lock a door rather than a time period which may be artificially long and to maintain a door in an unlocked condition longer than desired or needed.
Reference is now made to
The wireless access system 10 may be used to augment multi-factor authentication, e.g. use with a biometric identifier, personal identification number (PIN) code, key card, etc. The wireless access system 10 may also allow simultaneous multiple authentication of remote access device, for example, mobile wireless communications devices. More particularly, the wireless access system 10 may require a threshold number of authorized remote access devices 15 to be present at a same time for authentication to succeed.
The wireless access system 10 advantageously may provide increased security, for example. More particularly, the wireless access system 10 may force the user to authenticate in addition to authorization, via the remote access device 15 before the door can be opened. For example, the remote access device 15 may include an authentication device 24 for authentication via a biometric, password, PIN, shake pattern, connect-the-dots, or combination thereof, for example, prior to accessing the lock 11. In the case of the remote access application 17 on a mobile wireless communications device, for example, the application may have multiple security levels to enable these features, as will be appreciated by those skilled in the art.
With respect to security features, by using proximity sensors, switches, or the like, the wireless access system 10 may indicate whether a user locked the door, for example. When a user locks the door, for example, the remote access application 17 may log “Lock” with a time stamp so that it may be tracked and checked on the remote access device 15, i.e. the mobile wireless communications device, for example. The wireless access system 10 may include a sensing device 26 for example, an accelerometer to track door openings, for example. Based upon the accelerometer, data may be provided through the application or via the Internet or other network, for example. The sensing device 26 may be another type of device, for example, a touch sensor.
In one advantageous security feature, when the door is opened, or an attempt is made to open the door, which may be detected by the accelerometer 26 or other door opening determining methods, as will be appreciated by those skilled in the art, known, and even previously revoked, remote access devices 15 in range and/or discoverable devices, may be recorded along with a time stamp. This may capture an unauthorized user, for example.
Another advantageous feature of the wireless access system 10 may allow authorized visits, for example. More particularly, an authorized visit may be enabled by a 911 dispatcher or other authorized user to allow special or temporary access by the smart phone of a normally unauthorized user, for example. The wireless access system 10 may keep a log/audit trail. Approval may be granted by trusted a friend or special authority, for example, emergency medical services, a fire department, or a police department.
The wireless access system 10 may also include a security feature whereby when a threshold time has elapsed, the wireless access system may ignore a remote access device 15 in range. This advantageously reduces or may prevent unauthorized access that may occur from leaving a remote access device 15 that is authorized inside near the door. A timeout function (via a timer, not shown) may additionally be used in other undesired entry scenarios. The wireless access system 10 may also log all rejected pairing attempts, as will be appreciated by those skilled in the art.
The wireless access system 10 may also include a revocable key security feature. For example, the wireless access system 10 may include both revocable and non-revocable keys. If, for example, the wireless access system 10 is unable to access the server 34 to verify keys, for example, the wireless access system may force the application 17 on the remote access device 15, for example, to check the servers. If the wireless access system 10 is unable to connect or verify the keys, access is denied.
The identification of remote access device may be stored in memory 55 or at server 34, or computer 25. The status of the key as a one-time key, or limited duration key may also be stored. During the authentication process, lock 11 may compare the identification and/or password information with information stored within system 10 to determine whether access has been revoked or expired.
For example, the revocable key feature may be particularly advantageous to keep an old boyfriend, for example, who is aware that his key is being revoked from being able to turn off his remote access device 15 so that the key is not deleted. However, a wireless connection for the remote access device 15 may be a prerequisite to access in some instances.
As will be appreciated by those skilled in the art, the wireless access system 10 has the ability to transfer a key from one remote access device 15 to another with the remote access application 17, for example. It may be desired that these keys be revocable in some configurations. However, if the remote access device 15 with the key to be revoked is not accessible via the network 28, then revocation may not be guaranteed if the lock 11 is offline, for example. The wireless access system 10 advantageously addresses these challenges.
A proximity detection feature may be included in the wireless access system 10, and more particularly, the remote access device 15 may use a magnetic field sensor, such as, for example, a compass in mobile wireless communications device, as a proximity sensor to obtain a more uniform approach/departure distance calibration. A magnetic pulse or pulse sequence may be used in the lock 11 to illuminate a magnetic flux sensor in the remote access device 15 to establish proximity.
Additionally, the remote device 15, for example, a mobile wireless communications device or mobile telephone, may be qualified using both radio frequency (RF) and audio, for example. The remote access device 15 may be a source or sink of audio to help qualify proximity.
In another embodiment, as an alternative to a human driven lock, as noted above, a turn-tab (not shown) may be included that will “flip out” of the front of the lock 11 when pressed to allow the user to turn the lock on an un-powered deadbolt 14. It may be desirable that the surface area be no larger than a standard key, for example. The user pushes the turn-tab back into the lock face when done. The turn-tab may alternatively be spring loaded, for example.
In another embodiment, the turn-tab (not shown) may be added to a powered lock, for example the lock 11 described above. This is may be useful to help force ‘sticky’ locks, for example, as will be appreciated by those skilled in the art. This may also allow the user to give a manual assist to the motor in case of a strike/deadbolt 14 misalignment. This may also allow for operation in a low battery situation, for example. The turn-tab may be particularly useful in other situations.
Additionally, one of the deadbolts may have a traditional key backup as it may be needed for emergencies, for example, while the remaining deadbolts on a house may be keyless. This may eliminate the need to match physical keys on multiple deadbolts, and may reduce the cost for additional deadbolts.
The wireless access system 10 may also include an additional access feature. For example, with the RPU 30 connected to the Internet 28 through the home router 36, this provides access to the server 34 for example, it may be possible to have the lock 11 unlock via a command from the RPU 30 through the Internet. In other words, the lock 11 could be opened for users who don't have a remote access device 15. More particularly, they could call a call center or service that could unlock the lock 11 via the Internet 28, for example, or via other wireless communications protocol. Also, an authorized user could provide this action as well. Additionally, fire/police could gain access by this method if the lock owner opts-in to this service. As will be appreciated by those skilled in the art, alternatively, a command could be sent from the remote access device 15.
The wireless access system 10 may also include an activation indication. For example, the remote access device 15 can signal the operator via an auditory tone, vibration or other indication when the lock is activated. This may help communicate actions to the user to reduce any confusion.
The wireless access system 10 may also include an additional security feature. For example, the wireless access system 10 may use an additional authentication channel, for example, via a WLAN, WiFi, or other communication protocol, either wired or wireless, with the remote access device 15. This may improve authentication and make spoofing considerably more difficult, as will be appreciated by those skilled in the art.
As another security feature of the wireless access system 10, if cell service and data service, for example, if the remote access device 15 is a mobile phone, are turned off, remote access application may consider this a threat related to key revocation and authentication may not be approved.
Also, the lock 11 may include a radar device, or a radar device may be coupled adjacent the lock to detect the locations of the entrant by facing outward in its sweep to resolve inside/outside ambiguity, for example. If the radar does not detect an entrant, then by default the holder of the remote access device is inside and the lock is not activated.
The lock 11 includes an interior facing directional antenna 50 and a an external facing directional antenna 52. Each is operatively coupled to the radio 22 to send signals to, and listen for signals from, remote access devices 15. If a remote access device 15 is on the interior of the lock, then the interior facing directional antenna 50 communicates with remote access device 15, and the calibrated signal strength sensed by directional antenna 50 will be greater than the calibrated signal strength sensed by directional antenna 52 (which may be no sensed signal). Lock 11, and in turn system 10, determine that remote access device is inside the home, dwelling or structure. Conversely, if remote access device 15 is exterior of the lock, exterior facing directional antenna 52 communicates with remote access device 15 and the signal strength at directional antenna 52 is greater than the signal strength received at directional antenna 50. System 10 determines that remote access device 52 is outside of the dwelling and operates as discussed above. The lock 11 compares the signals from interior facing directional antenna 50 and exterior facing directional antenna 52 to confirm the location of remote access device 15 prior to enabling the remote access device 15 to control lock 11. This prevents undesired unlocking if an authorized user is inside the door.
It is known in the art including, from the above, it becomes readily apparent that wireless access system 10 can track the time that a user attempts to access lock 11. However, an additional benefit provided by the structure and methodology of communicating with remote access device 15 while it is in interior of the door overcome a problem with fingerprint readers and other user stimulus log-ins. Namely, tracking the time that a user is within a facility; not just the fact that a door has been opened.
Reference is now made to
In a step 1901, remote access device 15 gains access through the door utilizing wireless access control system 10 through any of the embodiments discussed above. In a step 1902, controller 32 or controller 21, of wireless access system 10 logs the time of access for remote access device 15 in a step 1902.
In a step 1903, the wireless access controls system pings remote access device 15. Based on RSSI differential as discussed above or other positioning techniques, in a step 1904 wireless access control system determines whether the position of remote access device 15 is within the monitored area. If the device is confirmed to be within the monitored area in step 1904, the process returns to step 1903. If it is determined by either of controller 21 or 32 that remote access device 15 is no longer within the area, then the process is stopped in a step 1905.
A mechanical or zero/low-power tilt sensor may be configured to detect break-in events, for example to the lock 11. Upon a detected break-in, the lock 11 activates and thereafter communicates to the RPU 30 to report an intruder alert. The lock 11 may also store information, in a memory, for example, if home-connect plugin is off-line.
Indeed, while the different components of the wireless access system 10 have been described with respect to a wireless protocol, it will be appreciated by those skilled in the art that the components may communicate via a wired network and protocols or a combination of wired and wireless networks. Additionally, while Bluetooth, Bluetooth Low Energy, and WLAN (i.e. WiFi) has been described herein as wireless protocols of particular merit, other wireless protocols may be used, for example, Zywave, ZigBee, near field communication (NFC), and other wireless protocols.
Many modifications and other embodiments of the invention will come to the mind of one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is understood that the invention is not to be limited to the specific embodiments disclosed, and that modifications and embodiments are intended to be included within the invention.
Claims
1. A lock for locking and unlocking a door in which the door is disposed comprising:
- an accelerometer for detecting acceleration of a door in which the lock is disposed and generating an acceleration signal in response to the movement of the door;
- a controller receiving the accelerometer signal, and determining a state of the door as a function of the accelerometer;
- outputting a state signal when the controller determines the state of the door; and
- at least one antenna for transmitting the state signal.
2. The lock of claim 1, wherein the state is one of open and closed.
3. A wireless access controls system comprising:
- a remote access device for transmitting an access request;
- a controller for controlling the lock;
- a lock for locking and unlocking a door in which the lock is disposed, the lock receiving the access request and the controller enabling the lock to be one of locked or unlocked in response to the access request;
- the remote access device having a controller for generating the signal, the remote access device determining that a false reject event has occurred and storing the radio frequency signal strength information for the false reject event, and the controller calibrating the wireless access control system as a function of the radio frequency signal strength information for each false reject event.
4. The system of claim 3, wherein auto calibration occurs if a small number of false reject events precede a successful access event within a predetermined time period.
5. The system of claim 3, wherein auto calibration occurs when a large number of false rejection events have radio frequency signal strength information within ten percent of a current authorization radio frequency signal strength information value for the wireless access control system.
6. A wireless access control system comprising:
- a remote access device for transmitting a signal;
- a lock for locking and unlocking a door in which the lock is disposed, the lock receiving the signal and enabling the lock to be one of locked or unlocked in response to the signal;
- the remote access devices includes a geopositioning system, the signal being encrypted by incorporating the geolocation of the remote access device, the lock compares an encryption value for the encrypted signal to a predetermined encryption value corresponding to a position relative to the lock and allowing access when the encryption value matches the predetermined encryption data.
7. A method for calibration of a lock, the lock including at least two antennas comprising the step of:
- placing a remote access device a known distance from a first antenna, the remote access device sending a signal to the first antenna, the first antenna providing an input to a controller, the controller determining the radio frequency signal strength indication;
- placing the device a known distance from at least a second antenna, the second antenna providing an input to the controller, the controller determining a second radio frequency signal strength indication and deriving an improved location input for the lock relative to the remote access device as a function of the radio signal strength indicators from each antenna.
8. A system for locking a door in which the lock is disposed comprising:
- at least one antenna for receiving a signal from a remote access device;
- a controller operatively coupled to the antenna for receiving the signal, the controller causing a signal and an interrogation signal to be sent to the remote access device and receiving the signal in response to the interrogation, the controller determining the radio frequency signal strength of the signal and locking the lock when the radio frequency signal strength is less than a predetermined value.
9. A system for locking a door in which the lock is disposed comprising:
- at least one antenna for receiving a signal from a remote access device;
- a controller operatively coupled to the antenna for receiving the signal, the controller causing a signal and an interrogation signal to be sent to the remote access device and receiving the signal in response to the interrogation, the controller determining the radio frequency signal strength of the signal and locking the lock when the radio frequency signal strength decays at a predetermined rate.
10. A lock for locking and unlocking a door in which the lock is disposed comprising:
- a controller for controlling the current state of the lock by changing the state of the lock;
- a touch sensor for detecting the presence of a user and outputting a presence signal, the controller receiving the presence signal and changing the state of the lock from a low power broadcast state to a higher power broadcast and listening state in response to the presence signal;
- the controller determining that the touch sensor has been touched a predetermined number of times within a predetermined time period and adjusting the time period during which a single touch must occur to be considered a touch event.
11. A method for preventing false activation of a wireless control system, the system including a remote access device and a lock, comprising the steps:
- the remote access device requesting access from the lock by transmitting an access request signal, the lock determining the radio frequency signal strength indication of the request signal and whether it exceeds a threshold value;
- providing an access control system response signal to the remote access device when the remote access device signal exceeds the threshold value;
- the remote access device determining whether the remote access system signal exceeds the threshold; and
- the lock allowing access when the remote access device determines that the wireless access system signal exceeds the threshold.
12. A method for monitoring the presence of a user within an access controlled area utilizing a remote access device on the person of the user comprising the steps of:
- determining that access to the controlled area has been obtained;
- logging the time that the remote access device was determined to be within the area;
- pinging the remote access device at predetermined intervals;
- determining as a function of the response to the ping whether the device is within the controlled access area.
13. A method for transferring a credential from an authorized device to an unauthorized device comprising the steps of:
- placing an authorized access device within a predetermined distance from an unauthorized device;
- determining whether the authorized device and the unauthorized device are within the predetermined threshold by determining that the radio frequency signal strength indicator value of a signal transmitted by the unauthorized device to the authorized devices exceeds a predetermined value; and
- transmitting the credential from the authorized device to the unauthorized device, authorizing the unauthorized device to access the lock.
14. The method for transferring a credential of claim 1, wherein the unauthorized access device is a fixed access point, and further comprising the step of bringing the authorized device in sufficient proximity to an access control system, the sufficient proximity being determined by the access system transmitting a signal to the authorized device, the authorized device determining the radio frequency signal strength indicator of the transmitted signal, and transmitting the credential of the access point to the access system to pair the access point and access system when the radio frequency signal strength indicator exceeds a predetermined value.
15. A lock for locking and unlocking a door in which the lock is disposed comprising:
- a controller for controlling the state of the lock;
- a proximity detector disposed within a cylinder of the lock for detecting the insertion of a key into the cylinder, the proximity detector sending a presence signal to the controller upon detecting the presence of a key within the cylinder;
- the controller disabling the lock relative to a remote access device associated with the user of the key for unlocking the lock.
Type: Application
Filed: Aug 15, 2013
Publication Date: Mar 20, 2014
Applicant: Unikey Technologies, Inc. (Winter Park, FL)
Inventors: Philip C. Dumas (Orlando, FL), Thomas Bennett (Maitland, FL), Justin Handville (Largo, FL)
Application Number: 13/968,067
International Classification: G07C 9/00 (20060101);